fkie_cve-2015-5161
Vulnerability from fkie_nvd
Published
2015-08-25 17:59
Modified
2025-04-12 10:46
Severity ?
Summary
The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.
References
secalert@redhat.comhttp://framework.zend.com/security/advisory/ZF2015-06Vendor Advisory
secalert@redhat.comhttp://legalhackers.com/advisories/zend-framework-XXE-vuln.txtExploit
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html
secalert@redhat.comhttp://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.htmlExploit
secalert@redhat.comhttp://seclists.org/fulldisclosure/2015/Aug/46Exploit
secalert@redhat.comhttp://www.debian.org/security/2015/dsa-3340
secalert@redhat.comhttp://www.securityfocus.com/bid/76177Exploit
secalert@redhat.comhttps://www.exploit-db.com/exploits/37765/Exploit
af854a3a-2127-422b-91ae-364da2661108http://framework.zend.com/security/advisory/ZF2015-06Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://legalhackers.com/advisories/zend-framework-XXE-vuln.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2015/Aug/46Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3340
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/76177Exploit
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/37765/Exploit
Impacted products
Vendor Product Version
zend zend_framework 1.0.0
zend zend_framework 1.0.0
zend zend_framework 1.0.0
zend zend_framework 1.0.0
zend zend_framework 1.0.0
zend zend_framework 1.0.1
zend zend_framework 1.0.2
zend zend_framework 1.0.3
zend zend_framework 1.0.4
zend zend_framework 1.5.0
zend zend_framework 1.5.0
zend zend_framework 1.5.0
zend zend_framework 1.5.1
zend zend_framework 1.5.2
zend zend_framework 1.5.3
zend zend_framework 1.6.0
zend zend_framework 1.6.0
zend zend_framework 1.6.0
zend zend_framework 1.6.0
zend zend_framework 1.6.1
zend zend_framework 1.6.2
zend zend_framework 1.7.0
zend zend_framework 1.7.0
zend zend_framework 1.7.0
zend zend_framework 1.7.1
zend zend_framework 1.7.2
zend zend_framework 1.7.3
zend zend_framework 1.7.3
zend zend_framework 1.7.4
zend zend_framework 1.7.5
zend zend_framework 1.7.6
zend zend_framework 1.7.7
zend zend_framework 1.7.8
zend zend_framework 1.7.9
zend zend_framework 1.8.0
zend zend_framework 1.8.0
zend zend_framework 1.8.0
zend zend_framework 1.8.1
zend zend_framework 1.8.2
zend zend_framework 1.8.3
zend zend_framework 1.8.4
zend zend_framework 1.8.4
zend zend_framework 1.8.5
zend zend_framework 1.9.0
zend zend_framework 1.9.0
zend zend_framework 1.9.0
zend zend_framework 1.9.0
zend zend_framework 1.9.1
zend zend_framework 1.9.2
zend zend_framework 1.9.3
zend zend_framework 1.9.3
zend zend_framework 1.9.4
zend zend_framework 1.9.5
zend zend_framework 1.9.6
zend zend_framework 1.9.7
zend zend_framework 1.9.8
zend zend_framework 1.10.0
zend zend_framework 1.10.0
zend zend_framework 1.10.0
zend zend_framework 1.10.0
zend zend_framework 1.10.1
zend zend_framework 1.10.2
zend zend_framework 1.10.3
zend zend_framework 1.10.4
zend zend_framework 1.10.5
zend zend_framework 1.10.6
zend zend_framework 1.10.7
zend zend_framework 1.10.8
zend zend_framework 1.10.9
zend zend_framework 1.11.0
zend zend_framework 1.11.0
zend zend_framework 1.11.0
zend zend_framework 1.11.1
zend zend_framework 1.11.2
zend zend_framework 1.11.3
zend zend_framework 1.11.4
zend zend_framework 1.11.5
zend zend_framework 1.11.6
zend zend_framework 1.11.7
zend zend_framework 1.11.8
zend zend_framework 1.11.9
zend zend_framework 1.11.10
zend zend_framework 1.11.11
zend zend_framework 1.11.12
zend zend_framework 1.11.13
zend zend_framework 1.12.0
zend zend_framework 1.12.0
zend zend_framework 1.12.0
zend zend_framework 1.12.0
zend zend_framework 1.12.0
zend zend_framework 1.12.1
zend zend_framework 1.12.2
zend zend_framework 1.12.3
zend zend_framework 1.12.4
zend zend_framework 1.12.5
zend zend_framework 1.12.6
zend zend_framework 1.12.7
zend zend_framework 1.12.8
zend zend_framework 1.12.9
zend zend_framework 1.12.10
zend zend_framework 1.12.11
zend zend_framework 1.12.12
zend zend_framework 1.12.13
zend zend_framework 2.0.0
zend zend_framework 2.0.0
zend zend_framework 2.0.0
zend zend_framework 2.0.0
zend zend_framework 2.0.0
zend zend_framework 2.0.0
zend zend_framework 2.0.0
zend zend_framework 2.0.0
zend zend_framework 2.0.1
zend zend_framework 2.0.2
zend zend_framework 2.0.3
zend zend_framework 2.0.4
zend zend_framework 2.0.5
zend zend_framework 2.0.6
zend zend_framework 2.0.7
zend zend_framework 2.1.0
zend zend_framework 2.1.1
zend zend_framework 2.1.2
zend zend_framework 2.1.3
zend zend_framework 2.1.4
zend zend_framework 2.1.5
zend zend_framework 2.1.6
zend zend_framework 2.2.0
zend zend_framework 2.2.1
zend zend_framework 2.2.2
zend zend_framework 2.2.3
zend zend_framework 2.2.4
zend zend_framework 2.2.5
zend zend_framework 2.2.6
zend zend_framework 2.2.7
zend zend_framework 2.2.8
zend zend_framework 2.2.9
zend zend_framework 2.2.10
zend zend_framework 2.3.0
zend zend_framework 2.3.1
zend zend_framework 2.3.2
zend zend_framework 2.3.3
zend zend_framework 2.3.4
zend zend_framework 2.3.5
zend zend_framework 2.3.6
zend zend_framework 2.3.7
zend zend_framework 2.3.8
zend zend_framework 2.3.9
zend zend_framework 2.4.0
zend zend_framework 2.4.1
zend zend_framework 2.4.2
zend zend_framework 2.4.3
zend zend_framework 2.4.4
zend zend_framework 2.4.5
zend zend_framework 2.5.0
zend zend_framework 2.5.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C42B4F3-D79C-42DE-B86C-9E7612E71661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "536CC39B-D305-492F-892C-6431BD7BA95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17673E8C-CB65-447E-8A6B-1083E6E77B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.0.0:rc2a:*:*:*:*:*:*",
              "matchCriteriaId": "CA85105D-B9FB-4147-87B7-4F4DD0324AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "99C549AF-2C59-4D8E-B651-EA630C3B2975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EF804C-102C-47F5-A85A-63EAA7EF9BAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B648466-36AD-4EC0-BDE1-C976F697D58F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DCE27-D2D1-4329-88F5-911DA763469C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1417EB1F-5342-443B-AC81-3256FCCE1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BE350CD6-54CA-4BDF-9327-60F872098D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E3603D2F-91FE-4B12-A5BC-2F63E1612A39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.5.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "04524F0F-6C21-4670-9B2C-A3B06C151799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BD97A6-336A-4B8A-AFC5-C9EA1DDCCC8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B636257-9941-4997-9525-F8C5A920AB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "118C20B5-FC8D-4EBF-A7D7-975A568A31BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CEB67E5-D7D9-443A-9176-3104A9C068AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "20C61B54-2D08-45FD-A10A-34AD50EC3BED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1FD68242-67DB-4C1D-8265-7839976DBCEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9C32036E-14BC-48AE-92A4-9DDCC96EC557",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F965C4F5-5F12-42CF-B120-758205E0E050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "531B7A51-2B4C-4A50-A8C8-D81040FF6E31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D75279-B5A8-4C82-B2C0-C58DEF56A086",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.0:pl1:*:*:*:*:*:*",
              "matchCriteriaId": "EE99D584-E652-4B9F-BD2E-45A167B1524C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.0:pr:*:*:*:*:*:*",
              "matchCriteriaId": "0EE1CCE3-4AD0-4ABD-B4C9-5390F9CDB37F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D97342-CF37-486E-A3C9-FBA000F5A041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "819E0C25-1413-4532-9427-24520E23C07B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A96DF1-81D9-4BD3-9E62-CEECE377406D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.3:pl1:*:*:*:*:*:*",
              "matchCriteriaId": "744FEDE8-5825-4C5C-887D-9ADCC9183AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF957F4D-FDFD-419B-AD2B-02E572A3BA9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "000BAA0C-6546-4DEC-8B85-146508C19F5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "429128C9-689E-49EA-BD8C-138FC337AB08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2096048C-7E4A-415E-AEBF-9AB7E8BCE894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B72E45D-E298-45BD-9EE5-127D3EFEC17C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D06D35-CE63-456D-A970-5AE663175E8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "11459424-1BA2-44D0-B831-92BE6E2664E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.8.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "FACC0F56-C6CB-4BC7-946E-8077B2C90B2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.8.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "BB4F6AA5-8320-4451-9C8C-02D68FE4CA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A847F7F6-18EF-44FB-9153-BD7D3223D6ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBE53880-D68C-49CB-BFE7-D1806AAD5C6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "45B7421E-E0C4-4594-AE81-4F3811CAAB33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EABF4FA-D4A6-4C82-BF9C-A828B906F499",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.8.4:pl1:*:*:*:*:*:*",
              "matchCriteriaId": "1EA1EBE6-0E18-44FA-BE72-D6512E7409B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F10191E-9EF7-47B8-9CDC-FCFE47AEFE50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3E24C3-21CC-4ED2-8669-5D94BD5D99AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "075019DE-CC38-4DFF-B869-5884A7AC9000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "81CC10E4-37A8-4BAD-AC6D-EAD3A7E70CD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8B3E9C9A-E12F-43EC-9134-4EFF2BA6B4D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B01DA0-E43B-456F-98CB-B806E3A54E94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD3BA6AE-8D0D-48C4-82C2-90164113232A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C405425-36E0-458C-9EB8-760703DF39DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.3:pl1:*:*:*:*:*:*",
              "matchCriteriaId": "1E3911A0-F189-488A-9246-BA8B1CF9B8CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAC94846-2345-4A62-8E57-AC7EAFCD05D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8074B0AD-C349-4BAC-9076-DD08893F5574",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "18F43C9F-1EE9-4B77-AD35-EB1286BED2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "557E4E4E-0022-4EEA-A08D-BFE2392147EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AC4C9BC-B0FC-4050-B998-5DB523C26EE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C844B367-8CE3-4347-B822-FA74D29E87C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "0AAF2D17-6E72-4E27-B94B-397DB9C3A682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "CF93FB2E-0F51-4EE0-9A29-91B2A2311FF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "528D7214-C4EE-40D9-83CF-F9B81382F257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78EAC4C3-D9D3-4F3C-A56E-C434F15860CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6322EB6C-3CAD-4E61-AC47-FDB416F9BAEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A341606-0AD5-442B-BEF3-D8246402CE00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F033605-4770-453C-9C8D-48AB36B93F23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CF3E847-EF03-4B57-B54F-01E2D4DA2261",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5E7A156-6F31-48D6-B1A7-991CDC120602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC72907-188E-4B2B-AA08-482A98227961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB1E9C46-CF7B-4142-A178-C21EB3E4C844",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.10.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0227AEB0-4C45-4744-8501-B20F7B4254D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A033B19-5C9B-4948-88C6-9B8E69135112",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "D5B221F8-CF2D-4994-87D9-57375D0942DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E8BCCB2A-7873-4027-AECE-024EF7A71E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81773611-D93F-4A8A-AE36-BEE60385F39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAF5871-E892-4EDE-8845-E3633E10F733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "99D5C2A0-11C8-458A-910F-58E7F39243C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE49C5F9-1C3D-44FD-831D-663013EDFA30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B338FCC6-506F-468D-9551-B7FA22D31BD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "687ABF79-8F2F-4E5F-BF2A-42AD4F60C178",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E96CB5-E6F8-4163-8A95-B72C243FF133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F486B0E-45D9-4B15-B4B7-1C35C3B9A8C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A751B994-80CF-475C-AFCC-C3645A4B2BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F25F13A3-867D-4D79-8B7B-9771D3DB0540",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "64C08E10-14D4-4ACE-9064-8322A09773C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA4B247-94D3-400C-A575-3DBA755C24E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.11.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D934F3F-997E-44B8-A4D2-CC07FEEB7271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DBCDD61-759D-4623-B7ED-88E78BDE7397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A78C7EE7-7C12-45D2-913E-DC4902886C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "97F3ED10-8D1F-4D01-A79B-95AAF864B0BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1E65648D-78FF-47D8-9F9E-66E9A8C121AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "DA6467DF-3983-4BB9-ACC7-C6AFE753E319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "93186E8D-5681-4350-A6B1-C020B3C47560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A65D2D2-766B-4C47-B6B8-352184D4D15A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DA1CB81-12EF-4509-9D64-726B6E29C3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0156E81D-4059-4B2E-A0CB-16DE1769DD57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0724571D-979D-4608-94A0-139848A37AFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C3CE5F6-2B7C-4DDC-A8AD-15850DD98235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD215689-EFF4-47D4-B6B2-573857E84288",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "74B48102-DC93-4C5A-9297-0FCE790AD62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "287EB2A5-CAC2-45F7-9980-2F003249AFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1D2AEAB-A3F6-4DC4-A590-75B8F0153605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBD287F1-7CB2-4DCA-84A0-495DE57EAB4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37F6DF4-A6F6-476C-AF90-5703E5054532",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:1.12.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A46B5E-3BCB-4296-9BAE-44AA3648BD3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED897A0F-2530-4414-A7B1-D505952E2B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "ED954B74-0A27-4DFE-B4FD-FCD996043A7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "24801F0A-F796-41BF-9E87-AEA99490CD9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "7D0E7E8F-C212-42DB-9EB5-816AD5B3A681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "12645463-1317-48D2-AA01-E835CD296510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B3F15A9A-DC75-45B8-B674-FA47166B9BA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "CF328AB4-C203-40AC-AB50-C3065236CB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "6F6122C6-8332-40DC-B5EF-5403C3DE5594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADD454CB-F1E7-4373-815F-896D68D150D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F1D7828-D023-46D6-8F1B-A7D62C8F133E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A123161-76A3-4AAF-ACE6-6EF7A686B74F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C3EFB5-99A7-4F05-B17C-56451FFB5860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "62D6D1C8-4733-4758-8883-2F85B8DB3A72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "43A6BA3C-F356-4A64-9AEE-2262DB0B46A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AEF2B4-B24C-42E2-8525-E7595E9283F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B584F0-75AB-4670-A460-92A1CF27F0CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E14CED-60C4-4D16-9807-1B86F69FB516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C32DC80-7367-4D82-A755-DE397629EA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "30AEC279-C346-48D1-B3E1-92C64CA1A4B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "328F76F9-F195-4212-803F-CD3D104F3A6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB893A06-1A7D-43A9-B51B-C9242F74AAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CA225A4-8427-4016-AFD1-6BDC3421A531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D51607-3FA8-4E30-8B02-004F056583E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "90A9D6B0-D34B-423A-AB7D-D6B14F3F1FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E258FDD6-AF80-4166-A3C0-BC41EAFD894C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B537EBA-396D-4C52-A65D-CD26E59EE44A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "80CD59F7-E5F7-4146-A422-79C652121D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F760DAF-39EE-400E-BEF4-B6816080538A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB89CEA-8DC2-4DD2-8A41-BD944261E1CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85F6A88-33E7-4C71-B52B-99D13CD23F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "75E530D7-6033-4151-AEF6-F7A0E3CC86CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ACABA67-F66C-4597-B0F6-A6A6B7DF85EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6A15D7-27BB-4625-BD14-A0CE2F213D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B32A65-119C-45EF-8122-EBFCA41A1696",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E9E662-1642-49D6-9908-9BD4DE479114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ACBA96F-C081-4B66-BC4B-C456FA688EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "23C2DD7D-3CB8-4E69-9B4D-B0A4552A1177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3129429-DD49-416B-BFD0-174713966A9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDE54C3-5D05-4CEE-8FA1-840E6DC5D110",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F95F9508-D1E5-410F-A2B0-635E1524720A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "03CC3191-5BEE-417D-9420-08F65E4F28FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F8CB49F-F050-4F45-A72E-D5B9C43B0E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF5AD2CD-3CE5-4465-9EEB-0F990AF48588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CE2C2D7-D937-427B-9690-B1EA32314042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "98145CC7-4F7E-40B2-BDD3-08AF81634AF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "35909C93-F7B3-4072-9FB7-E806AFDB585C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8AFDDAC-A697-4F0C-9C1B-507A85DF8473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F724D0C-0A0D-48A0-AE0B-A9645062AEF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC1E6B1-1456-419E-9711-10EAD142FE6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8CF6A3D-A182-4800-89FA-44BC4ACD7291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zend:zend_framework:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCDA71DB-7D92-47EC-A706-2A61ACDC7CEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad en el Zend_Xml_Security::scan en ZendXml en versiones anteriores a 1.0.1 y Zend Framework en versiones anteriores a 1.12.14, 2.x en versiones anteriores a 2.4.6 y 2.5.x en versiones anteriores a 2.5.2, cuando se ejecuta bajo PHP-FPM en un entorno con hilos, permite a atacantes remotos evadir la verificaci\u00f3n de seguridad y realizar ataques de entidad externa XML (XXE) y de expansi\u00f3n de entidad XML (XEE) a trav\u00e9s de caracteres multibyte codificados."
    }
  ],
  "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/611.html\"\u003eCWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)\u003c/a\u003e",
  "id": "CVE-2015-5161",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-08-25T17:59:03.307",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://framework.zend.com/security/advisory/ZF2015-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2015/Aug/46"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2015/dsa-3340"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/76177"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.exploit-db.com/exploits/37765/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://framework.zend.com/security/advisory/ZF2015-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2015/Aug/46"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3340"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/76177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.exploit-db.com/exploits/37765/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…